Visible to the public Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly

TitleTwo-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly
Publication TypeConference Paper
Year of Publication2014
AuthorsKun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin
Conference NameComputer Communication and Networks (ICCCN), 2014 23rd International Conference on
Date PublishedAug
KeywordsAlgorithm design and analysis, anomaly detection, autocorrelation analysis, Computer crime, computer network security, Correlation, denial of service attack, detection algorithm, detection algorithms, detection systems, inhibit normal TCP flows, localized periodicity analysis, misuse detection, Multiresolution analysis, Network security, network traffic, reduction of quality, RoQ attack, Time-frequency Analysis, traffic anomaly, wavelet analysis, wavelet multiresolution analysis method
Abstract

Reduction of Quality (RoQ) attack is a stealthy denial of service attack. It can decrease or inhibit normal TCP flows in network. Victims are hard to perceive it as the final network throughput is decreasing instead of increasing during the attack. Therefore, the attack is strongly hidden and it is difficult to be detected by existing detection systems. Based on the principle of Time-Frequency analysis, we propose a two-stage detection algorithm which combines anomaly detection with misuse detection. In the first stage, we try to detect the potential anomaly by analyzing network traffic through Wavelet multiresolution analysis method. According to different time-domain characteristics, we locate the abrupt change points. In the second stage, we further analyze the local traffic around the abrupt change point. We extract the potential attack characteristics by autocorrelation analysis. By the two-stage detection, we can ultimately confirm whether the network is affected by the attack. Results of simulations and real network experiments demonstrate that our algorithm can detect RoQ attacks, with high accuracy and high efficiency.

DOI10.1109/ICCCN.2014.6911829
Citation Key6911829